Browsing the "CSRF" Tag

Ubuntu Security Notice USN-4407-1 ≈ Packet Storm

July 2nd, 2020 📆 | 2315 Views ⚑

==========================================================================Ubuntu Security Notice USN-4407-1July 01, 2020 libvncserver vulnerabilities========================================================================== A security issue affects these releases of Ubuntu and its derivatives: –

Tagged with:




Ubuntu Security Notice USN-4408-1 ≈ Packet Storm

July 2nd, 2020 📆 | 3463 Views ⚑

==========================================================================Ubuntu Security Notice USN-4408-1July 02, 2020 firefox vulnerabilities========================================================================== A security issue affects these releases of Ubuntu and its derivatives: –

Tagged with:




Ubuntu Security Notice USN-4409-1 ≈ Packet Storm

July 2nd, 2020 📆 | 4616 Views ⚑

=========================================================================Ubuntu Security Notice USN-4409-1July 02, 2020 samba vulnerabilities=========================================================================A security issue affects these releases of Ubuntu and its derivatives: – Ubuntu

Tagged with:




Online Shopping Portal 3.1 SQL Injection / Shell Upload ≈ Packet Storm

July 2nd, 2020 📆 | 1727 Views ⚑

# Exploit Title: Online Shopping Portal 3.1 – Authentication Bypass# Date: 2020-06-25# Exploit Author: Ümit Yalçın# Vendor Homepage: https://phpgurukul.com/shopping-portal-free-download/# Version:

Tagged with:




PHP-Fusion 9.03.60 PHP Object Injection ≈ Packet Storm

July 2nd, 2020 📆 | 2506 Views ⚑

*]# Exploit Title: PHP-Fusion 9.03.60 – PHP Object Injection*]# Date: 2020-05-26*]# Exploit Author: coiffeur*]# Vendor Homepage: https://www.php-fusion.co.uk/home.php*]# Software Link: https://www.php-fusion.co.uk/php_fusion_9_downloads.php*]#

Tagged with:




e-learning PHP Script 0.1.0 SQL Injection ≈ Packet Storm

July 2nd, 2020 📆 | 3242 Views ⚑

# Exploit Title: e-learning Php Script 0.1.0 - 'search' SQL Injection# Date: 2020-06-29# Exploit Author: KeopssGroup0day,Inc# Vendor Homepage: https://github.com/amitkolloldey/elearning-script# Software

Tagged with:




Red Hat Security Advisory 2020-2777-01 ≈ Packet Storm

July 1st, 2020 📆 | 8458 Views ⚑

—–BEGIN PGP SIGNED MESSAGE—–Hash: SHA256 =====================================================================Red Hat Security Advisory Synopsis: Moderate: kernel-rt security and bug fix updateAdvisory ID: RHSA-2020:2777-01Product: Red

Tagged with:




Red Hat Security Advisory 2020-2781-01 ≈ Packet Storm

July 1st, 2020 📆 | 8291 Views ⚑

—–BEGIN PGP SIGNED MESSAGE—–Hash: SHA256 =====================================================================Red Hat Security Advisory Synopsis: Important: Red Hat JBoss Enterprise Application Platform 6.4.23 security updateAdvisory

Tagged with:




Red Hat Security Advisory 2020-2780-01 ≈ Packet Storm

July 1st, 2020 📆 | 4439 Views ⚑

—–BEGIN PGP SIGNED MESSAGE—–Hash: SHA256 =====================================================================Red Hat Security Advisory Synopsis: Important: Red Hat JBoss Enterprise Application Platform 6.4.23 security updateAdvisory

Tagged with:




Red Hat Security Advisory 2020-2779-01 ≈ Packet Storm

July 1st, 2020 📆 | 3312 Views ⚑

—–BEGIN PGP SIGNED MESSAGE—–Hash: SHA256 =====================================================================Red Hat Security Advisory Synopsis: Important: Red Hat JBoss Enterprise Application Platform 6.4.23 security updateAdvisory

Tagged with:




Red Hat Security Advisory 2020-2784-01 ≈ Packet Storm

July 1st, 2020 📆 | 1536 Views ⚑

—–BEGIN PGP SIGNED MESSAGE—–Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Important: httpd24-nghttp2 security updateAdvisory ID: RHSA-2020:2784-01Product: Red Hat Software

Tagged with:




ATutor 2.2.4 Directory Traversal / Remote Code Execution ≈ Packet Storm

July 1st, 2020 📆 | 2007 Views ⚑

### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## class MetasploitModule < Msf::Exploit::RemoteRank = ExcellentRankinginclude Msf::Exploit::Remote::HttpClientinclude Msf::Exploit::CmdStagerinclude Msf::Exploit::FileDropperinclude Msf::Exploit::Remote::AutoCheck def

Tagged with: